Sciweavers

12257 search results - page 2154 / 2452
» Analysis of Algorithms
Sort
View
DIM
2009
ACM
15 years 8 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
MOMM
2009
ACM
162views Communications» more  MOMM 2009»
15 years 8 months ago
Towards an interactive multimedia experience for club music and dance
In this paper, we describe completed and ongoing work towards an interactive multimedia system that will appeal to today’s youth culture identified as most likely to adopt such ...
Dennis Majoe, Irena Kulka, Jan Schacher
SMA
2009
ACM
141views Solid Modeling» more  SMA 2009»
15 years 8 months ago
Robust principal curvatures using feature adapted integral invariants
Principal curvatures and principal directions are fundamental local geometric properties. They are well defined on smooth surfaces. However, due to the nature as higher order di...
Yu-Kun Lai, Shi-Min Hu, Tong Fang
ICFCA
2009
Springer
15 years 8 months ago
Handling Large Formal Context Using BDD - Perspectives and Limitations
This paper presents Binary Decision Diagrams (BDDs) applied to Formal Concept Analysis (FCA). The aim is to increase the FCA capability to handle large formal contexts. The main id...
Andrei Rimsa, Luis E. Zárate, Mark A. J. So...
ICIDS
2009
Springer
15 years 8 months ago
Comparing Effects of Different Cinematic Visualization Strategies on Viewer Comprehension
Abstract. Computational storytelling systems have mainly focused on the construction and evaluation of textual discourse for communicating stories. Few intelligent camera systems h...
Arnav Jhala, R. Michael Young
« Prev « First page 2154 / 2452 Last » Next »